Monitor Big Building Networks

Find out how Penn State uses Visual BACnet Site Manager

New Visual BACnet Site Manager shows overall network health, with ability to dig into specific problems

We're launching a new Visual BACnet Site Manager on April 25th, and we want to share all the powerful new features with you. 

Join us for a webinar with special guest Tom Walker from Penn State University. We'll show how PSU uses the Site Manager on their site, including:  

1. Aggregating different capture nodes across the campus network. 
2. Calculating overall and individual network health scores for capture nodes, areas, and sites. 
3. Monitoring and tracking the site score, to easily pinpoint problem areas and patterns.

Find out why the innovative Visual BACnet Site Manager gives facility managers the power to organize, understand, and optimize their building and campus networks. 

Date: Wednesday April 24th 
Time: 11 a.m. PST / 2 p.m. EST

Register now

Do you need help analyzing and solving a problematic BACnet network? Send your pcaps in, and our team of BACnet buffs will show you how they dig into files, from start to finish.

Visual BACnet is a powerful visualization tool for building automation system service providers.

BACnet is a widely used protocol for building networks that provides many benefits for connected building automation systems. But there are many issues that commonly plague BACnet networks.

Find out all the power and control you can get out of Optigo OneView.

What are MAC addresses, and how can you use them to help secure your network? Learn how OneClick Secure from Optigo OneView helps you secure your Operational Technology network in an instant.

An Operational Technology network can be made up of unmanaged switches, managed switches, or a centralized Network Management System (NMS). Learn about the differences between these different systems, and some of the pros and cons of each.

There are many protocols that make up the application layer of an IP network. Learn about some protocols you may have heard about, the roles they play on the application layer, and the importance of encryption.

Understand the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), and how they facilitate the sending and receiving of messages over IP networks.

A Virtual Private Network could be described as a “secure, encrypted tunnel,” and it’s a big topic these days as more folks work from home. Find out what a VPN is, and how it works.